Derek Atkins wrote:
> 
> If you allow any real-time protocol through your firewall, someone can
> tunnel through it.  It's a fact of life.  If you allow telnet, ssh,
> http, even nntp or smtp, it can be used to tunnel another protocol.
> If you want to disable tunneling, unplug yourself from the 'net.  If
> that isn't an option, then you're going to have to use social means to
> prevent people from doing it.

Or stateful inspection tools.  Which is what I was asking about.


**********************************************************
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**********************************************************

Reply via email to